Back to skill
v1.0.0

web3-data-skill

BenignClawScan verdict for this skill. Analyzed May 1, 2026, 6:01 AM.

Analysis

The artifacts show a coherent Chainbase Web3 data-query skill with disclosed external API use and an optional API key, with no evidence of hidden persistence, destructive actions, or off-purpose exfiltration.

GuidanceThis appears safe to install if you want Claude to query public on-chain data through Chainbase. Be aware that requests may run through a local bash/curl helper, may use your CHAINBASE_API_KEY if configured, and will send queried wallet addresses, token contracts, and SQL text to Chainbase.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

Abnormal behavior control

Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.

Tool Misuse and Exploitation
SeverityLowConfidenceHighStatusNote
scripts/chainbase.sh
endpoint="$1" ... --method=*) method="${arg#--method=}" ... --body=*) body="${arg#--body=}"

The wrapper lets the agent choose Chainbase API paths, methods, and request bodies. This is broad tool authority, but it remains bounded to Chainbase domains and matches the skill's stated data-query purpose.

User impactA broad or mistaken request could call an unintended Chainbase endpoint or run a large query with the user's Chainbase quota, but the artifacts do not show blockchain mutation or non-Chainbase exfiltration.
RecommendationUse it for read-only analytics and review unusually broad SQL or custom endpoint requests, especially if quota, billing, or large result sets matter.
Permission boundary

Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.

Identity and Privilege Abuse
SeverityLowConfidenceHighStatusNote
scripts/chainbase.sh
API_KEY="${CHAINBASE_API_KEY:-demo}" ... -H "${call_header}: ${API_KEY}"

The script reads an optional Chainbase API key from the environment and sends it as an API header to Chainbase. This is expected for the service and no artifact shows the key being logged or sent elsewhere.

User impactIf CHAINBASE_API_KEY is set, the agent's queries may use that account's quota or billing limits.
RecommendationUse a scoped Chainbase key where possible and avoid setting the environment variable if the demo key is sufficient.
Sensitive data protection

Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.

Insecure Inter-Agent Communication
SeverityLowConfidenceHighStatusNote
scripts/chainbase.sh
BASE_URL="https://api.chainbase.online" ... SQL_BASE_URL="https://api.chainbase.com/api/v1" ... curl -s

The skill sends wallet addresses, token contracts, SQL queries, and related request parameters to the external Chainbase provider. This data flow is disclosed and central to the skill.

User impactChainbase can see the blockchain identifiers and queries submitted through the skill, which may reveal what wallets or tokens the user is investigating.
RecommendationDo not query wallet addresses or other identifiers you consider private unless you are comfortable sending them to Chainbase.